Evaluation of Post-Quantum Distributed Ledger Cryptography

Robert Campbell
{"title":"Evaluation of Post-Quantum Distributed Ledger Cryptography","authors":"Robert Campbell","doi":"10.31585/JBBA-2-1-(4)2019","DOIUrl":null,"url":null,"abstract":"This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain and Hyperledger projects Fabric, and Sawtooth Lake. These blockchains are being used in media, health, finance, transportation and government with little understanding, acknowledgment of the risk and no known plans for mitigation and migration to safer public-key cryptography. \n\nThe second aim is to evaluate ECDSA against the threat of **Quantum Computing** and propose the most practical National Institute of Standards and Technology (NIST) Post-Quantum Cryptography candidate algorithm lattice-based cryptography countermeasure that can be implemented near-term and provide a basis for a coordinated industry-wide lattice-based public-key implementation. Commercial quantum computing research and development is rapid and unpredictable, and it is difficult to predict the arrival of fault-tolerant quantum computing. The current state of covert and classified quantum computing research and advancement is unknown and therefore, it would be a significant risk to blockchain and Internet technologies to delay or wait for the publication of draft standards. Since there are many hurdles Post-Quantum Cryptography (PQC) must overcome for standardisation, coordinated large-scale testing and evaluation should commence promptly.","PeriodicalId":33145,"journal":{"name":"The Journal of The British Blockchain Association","volume":"131 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2019-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Journal of The British Blockchain Association","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31585/JBBA-2-1-(4)2019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ECONOMICS","Score":null,"Total":0}
引用次数: 28

Abstract

This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain and Hyperledger projects Fabric, and Sawtooth Lake. These blockchains are being used in media, health, finance, transportation and government with little understanding, acknowledgment of the risk and no known plans for mitigation and migration to safer public-key cryptography. The second aim is to evaluate ECDSA against the threat of **Quantum Computing** and propose the most practical National Institute of Standards and Technology (NIST) Post-Quantum Cryptography candidate algorithm lattice-based cryptography countermeasure that can be implemented near-term and provide a basis for a coordinated industry-wide lattice-based public-key implementation. Commercial quantum computing research and development is rapid and unpredictable, and it is difficult to predict the arrival of fault-tolerant quantum computing. The current state of covert and classified quantum computing research and advancement is unknown and therefore, it would be a significant risk to blockchain and Internet technologies to delay or wait for the publication of draft standards. Since there are many hurdles Post-Quantum Cryptography (PQC) must overcome for standardisation, coordinated large-scale testing and evaluation should commence promptly.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
后量子分布式账本密码学评价
本文评估了当前比特币核心、以太坊、比特币现金和企业区块链(如多链和超级账本项目Fabric和锯齿湖)使用的椭圆曲线数字签名算法(**ECDSA**)加密技术的大量使用所带来的网络安全漏洞。这些区块链被用于媒体、卫生、金融、交通和政府,但人们对风险知之甚少,也没有任何已知的缓解计划,也没有向更安全的公钥加密迁移。第二个目标是评估ECDSA对量子计算的威胁,并提出最实用的美国国家标准与技术研究所(NIST)后量子加密候选算法基于格的加密对策,该对策可以在近期实施,并为协调的全行业基于格的公钥实施提供基础。商业量子计算的研究和发展是快速和不可预测的,很难预测容错量子计算的到来。秘密和机密量子计算研究和进展的现状是未知的,因此,延迟或等待标准草案的发布将对区块链和互联网技术构成重大风险。由于后量子密码学(PQC)的标准化需要克服许多障碍,因此应迅速开展协调的大规模测试和评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
11
审稿时长
5 weeks
期刊最新文献
Designing a Blockchain-Based Customer Loyalty Programme using Design Science Research Method Web 2 vs. Web 3 Paths to the Metaverse: Who Is Leading? Who Should Lead? Rewarding Honesty: An Incentive Mechanism to Promote Trust in Blockchain-Based E-commerce Compensation in DAOs: A Proposal Work for Decentralised Autonomous Organisation: What Empirical Labour Economics Can Tell Us about the Decentralised Digital Workforce
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1